SlideShare a Scribd company logo
1 of 38
Download to read offline
Online Identity:
          OpenID, OAuth, Information Cards
                                   OCRN Aug 2009

                   Kaliya Hamlin, Identity Woman
                                          @identitywoman
                                         identitywoman.net
                                        skype:identitywoman
                                     AIM/e-mail:kaliya@mac.com

                               co-founder, co-producer and the facilitator of the

                         INTERNET IDENTITY WORKSHOP
                             www.internetidentityworkshop.com
Wednesday, August 19, 2009
I am a community builder.
 This is the technical community around user-centric digital identity that I have helped
   build. We have met since 2005 every 6 months at the Internet Identity Workshop.




Wednesday, August 19, 2009
In mid 2004 Julia Butterfly Hill
                                    launched this website to encourage
                                    people to be active and linked to
                                    40+ organizations. These sites had
                                    about 50 login opportunities - each
                                    one of them each required a new/
                                    different user name and password.

        How were all these groups going to work together –to form a strong
        community - if the citizens they were asking to participate were
        required to create several dozen accounts just to join the related
        efforts and collaborate across them?
        The answer is: with difficulty.
        Just having links to good things is not enough to support a networked
        movement. Activism as Patriotism only lasted until early 2007.

Wednesday, August 19, 2009
My sketches from 2003 for distributed social network
                      platform with user-centric identity.




    How could the people that I knew shared interests and passion in
    community (both facet to face and online), be able to work together
    across boundaries and domains on the web?

    In 2003 I began to sketch out designs for online “social network
    tools” (that term was not yet in widespread use) for face to face communities to
    connect online. I knew user-centric identity technologies were essential
    but others didnʼt see it yet.

Wednesday, August 19, 2009
To cross boundaries and domains on the web people,
         citizens, consumers needed the power to manage their
         own identity information.

         By identity information I specifically mean the identifiers
         and handles that they use across time and in cyber
         space - controlling the ways in which they are “seen” in
         different contexts.

         To do this we need open technical standards to make
         identifiers portable across contexts and we need
         interfaces to make this easy.




Wednesday, August 19, 2009
The good news is that the identity community has
          come a long way in developing identity management
          tools. Three are discussed in this slideshare.




Wednesday, August 19, 2009
The first two technologies I will be covering are OpenID
     and OAuth - the key protocols in the so-called “open stack”




Wednesday, August 19, 2009
openid.net


Wednesday, August 19, 2009
OpenID creates an integrated and wholistic “online life” (identity)
        replacing the fragmentation that is created by maintaining 100-300
        different accounts for different online services and the necessity to
        create a new one at every website that requires a login.




        Can you imagine how much easier and more pleasant community
        life would be if we could reduce the number of identifiers and
        handles to a manageable number – say under ten.

Wednesday, August 19, 2009
Different persona’s for one user that could
                                 each have a different OpenID URL.

Wednesday, August 19, 2009
The user goes to a website




Wednesday, August 19, 2009
Traditionally the user is
                             presented with the
                             opportunity Login with a
                             user-name and password



Wednesday, August 19, 2009
user name/password
                                                                      is replaced with
                                                                     OpenID login box

                                         The user enters a URL they control
                                             - like their blog URL or from a provider.



                             * Newer user interfaces allow user to pick
                             Open ID provider they might have like
                             Google,Yahoo, Myspace, Facebook, AOL etc...

Wednesday, August 19, 2009
The website the
                              user is logging into

                             redirects the user to
                               where their URL


Wednesday, August 19, 2009
The user
        is asked to
       authenticate




Wednesday, August 19, 2009
The user responds
  with a password
     (or other additional
   methods of authentication
         like a token)




Wednesday, August 19, 2009
Authentication is successful!

       The site with the user’s URL
      redirects the user back to the
                                       the user is
      website they are logging into.
                                        logged in




Wednesday, August 19, 2009
Who’s In?
        Corporate Members:
          •   Facebook - Luke Shepard
          •   Google - Eric Sachs
          •   IBM - Nataraj (Raj) Nagaratnam
          •   Microsoft - Michael B. Jones   Community Members:
          •   PayPal - Andrew Nash            • Brian Kissel (JanRain)
          •   VeriSign - Gary Krall           • Chris Messina (independent)
          •   Yahoo! - Raj Mata               • David Recordon (Six Apart)
                                                 • Joseph Smarr (Plaxo)
                                                 • Nat Sakimura (Nomura
                                                   Research Institute)
                                                 • Scott Kveton
                                                 • Snorri Giorgetti (OpenID Europe)
                                                 • Allen Tom (Yahoo)

Wednesday, August 19, 2009
What you can do:



                             * Accept OpenID’s

                             * Issue OpenID’s (to employees)

                             * Issue OpenID’s to your user base




Wednesday, August 19, 2009
Single Sign On isnʼt enough though.
               You also have to empower people to be able to
               share data their own data.




                                 oauth.net

Wednesday, August 19, 2009
The user belongs to two different sites.
Wednesday, August 19, 2009
How can the user move photos from photo site to the
             social network site without giving away the password
                 for the photo site to the social network site?
Wednesday, August 19, 2009
The user asked if they want to share - then
              redirected to the site to give their permission

Wednesday, August 19, 2009
The photo site gives the social network site a token
               to the social network that gives it access to their account.
Wednesday, August 19, 2009
A data tunnel is created between the user’s
                                       accounts on both sites
Wednesday, August 19, 2009
A user posts photos and they can flow from
            one to the other - and they didn’t give away their password.

Wednesday, August 19, 2009
Who’s In?




Wednesday, August 19, 2009
What you can do:

                                END THE
                               PASSWORD
                              ANTI-PATTERN
                STOP Asking users for their password to gain
                   access to another site on their behalf


                        Implement Oauth on your site
                        Ask your partners to implement it.

Wednesday, August 19, 2009
informationcard.net


Wednesday, August 19, 2009
Wednesday, August 19, 2009
Wednesday, August 19, 2009
Wednesday, August 19, 2009
Wednesday, August 19, 2009
Reminders



Wednesday, August 19, 2009
Who’s In?


                             Card Space




Wednesday, August 19, 2009
Who’s In?




Wednesday, August 19, 2009
What you can do:
         *Issue information cards to members of your
         site/organization
         *Accept information cards from netizens to
         collect information you think is important
         *Use it to get third party validation about key
         things important to you - so you donʼt have
         to do identity proofing.



Wednesday, August 19, 2009
Kaliya Hamlin
                                     Identity Woman

                                     @identitywoman
                                    identitywoman.net
                                   skype:identitywoman
                                AIM/e-mail:kaliya@mac.com

                             co-founder, co-producer and the facilitator of the


              INTERNET IDENTITY WORKSHOP .com

Wednesday, August 19, 2009

More Related Content

Similar to Online Identity for Community Managers: OpenID, OAuth, Information Cards

Google Developer Days Brazil 2009 - Make your site social with Google Friend ...
Google Developer Days Brazil 2009 - Make your site social with Google Friend ...Google Developer Days Brazil 2009 - Make your site social with Google Friend ...
Google Developer Days Brazil 2009 - Make your site social with Google Friend ...Patrick Chanezon
 
web 2.0 Implementing the Social Web
web 2.0 Implementing the Social Webweb 2.0 Implementing the Social Web
web 2.0 Implementing the Social WebAnabelle P
 
The Open, Social Web
The Open, Social WebThe Open, Social Web
The Open, Social WebChris Messina
 
Opportunities for IT and SLA Professionals to Collaborate
Opportunities for IT and SLA Professionals to CollaborateOpportunities for IT and SLA Professionals to Collaborate
Opportunities for IT and SLA Professionals to CollaborateAnand Deshpande
 
Enterprise Collaboration Two (Deshpande India 2020)
Enterprise Collaboration Two (Deshpande India 2020)Enterprise Collaboration Two (Deshpande India 2020)
Enterprise Collaboration Two (Deshpande India 2020)Anand Deshpande
 
GOSO Social Media Bootcamp for September 22nd, 2010
GOSO Social Media Bootcamp for September 22nd, 2010GOSO Social Media Bootcamp for September 22nd, 2010
GOSO Social Media Bootcamp for September 22nd, 2010GOSO
 
Mcetech 2009 - Open Social
Mcetech 2009 - Open SocialMcetech 2009 - Open Social
Mcetech 2009 - Open SocialClaude Coulombe
 
Social Media 101 by Banyan Communications
Social Media 101 by Banyan CommunicationsSocial Media 101 by Banyan Communications
Social Media 101 by Banyan CommunicationsBanyan Communications
 
ThinkBalm Innovation Community -- new member meet-and-greet
ThinkBalm Innovation Community -- new member meet-and-greetThinkBalm Innovation Community -- new member meet-and-greet
ThinkBalm Innovation Community -- new member meet-and-greetThinkBalm
 
From WordPress to Blockchain, WordCamp Miami 2020
From WordPress to Blockchain, WordCamp Miami 2020From WordPress to Blockchain, WordCamp Miami 2020
From WordPress to Blockchain, WordCamp Miami 2020Bas van der Lans
 
Presentation social media icons (RISHA, HIFZ , SAKEENA, NOOR). rESOURCE PERSO...
Presentation social media icons (RISHA, HIFZ , SAKEENA, NOOR). rESOURCE PERSO...Presentation social media icons (RISHA, HIFZ , SAKEENA, NOOR). rESOURCE PERSO...
Presentation social media icons (RISHA, HIFZ , SAKEENA, NOOR). rESOURCE PERSO...Muhammad Ahmad
 
Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010megan.fitzgibbons
 
Social network services
Social network servicesSocial network services
Social network servicessuresh sood
 
The Open, Social Web Workshop
The Open, Social Web WorkshopThe Open, Social Web Workshop
The Open, Social Web WorkshopChris Messina
 

Similar to Online Identity for Community Managers: OpenID, OAuth, Information Cards (20)

OpenID 101
OpenID 101OpenID 101
OpenID 101
 
OpenID 101
OpenID 101OpenID 101
OpenID 101
 
Freedom to Aggregate, Freedom to Disaggregate
Freedom to Aggregate, Freedom to DisaggregateFreedom to Aggregate, Freedom to Disaggregate
Freedom to Aggregate, Freedom to Disaggregate
 
Google Developer Days Brazil 2009 - Make your site social with Google Friend ...
Google Developer Days Brazil 2009 - Make your site social with Google Friend ...Google Developer Days Brazil 2009 - Make your site social with Google Friend ...
Google Developer Days Brazil 2009 - Make your site social with Google Friend ...
 
web 2.0 Implementing the Social Web
web 2.0 Implementing the Social Webweb 2.0 Implementing the Social Web
web 2.0 Implementing the Social Web
 
The Open, Social Web
The Open, Social WebThe Open, Social Web
The Open, Social Web
 
cindy's slideshow
cindy's slideshowcindy's slideshow
cindy's slideshow
 
Opportunities for IT and SLA Professionals to Collaborate
Opportunities for IT and SLA Professionals to CollaborateOpportunities for IT and SLA Professionals to Collaborate
Opportunities for IT and SLA Professionals to Collaborate
 
Enterprise Collaboration Two (Deshpande India 2020)
Enterprise Collaboration Two (Deshpande India 2020)Enterprise Collaboration Two (Deshpande India 2020)
Enterprise Collaboration Two (Deshpande India 2020)
 
The Social Web
The Social WebThe Social Web
The Social Web
 
GOSO Social Media Bootcamp for September 22nd, 2010
GOSO Social Media Bootcamp for September 22nd, 2010GOSO Social Media Bootcamp for September 22nd, 2010
GOSO Social Media Bootcamp for September 22nd, 2010
 
Mcetech 2009 - Open Social
Mcetech 2009 - Open SocialMcetech 2009 - Open Social
Mcetech 2009 - Open Social
 
Social Media 101 by Banyan Communications
Social Media 101 by Banyan CommunicationsSocial Media 101 by Banyan Communications
Social Media 101 by Banyan Communications
 
ThinkBalm Innovation Community -- new member meet-and-greet
ThinkBalm Innovation Community -- new member meet-and-greetThinkBalm Innovation Community -- new member meet-and-greet
ThinkBalm Innovation Community -- new member meet-and-greet
 
From WordPress to Blockchain, WordCamp Miami 2020
From WordPress to Blockchain, WordCamp Miami 2020From WordPress to Blockchain, WordCamp Miami 2020
From WordPress to Blockchain, WordCamp Miami 2020
 
Presentation social media icons (RISHA, HIFZ , SAKEENA, NOOR). rESOURCE PERSO...
Presentation social media icons (RISHA, HIFZ , SAKEENA, NOOR). rESOURCE PERSO...Presentation social media icons (RISHA, HIFZ , SAKEENA, NOOR). rESOURCE PERSO...
Presentation social media icons (RISHA, HIFZ , SAKEENA, NOOR). rESOURCE PERSO...
 
Us our Organizations and the Evolving Web v2
Us our Organizations and the Evolving Web  v2Us our Organizations and the Evolving Web  v2
Us our Organizations and the Evolving Web v2
 
Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010Ielc adv b_internet_career_winter2010
Ielc adv b_internet_career_winter2010
 
Social network services
Social network servicesSocial network services
Social network services
 
The Open, Social Web Workshop
The Open, Social Web WorkshopThe Open, Social Web Workshop
The Open, Social Web Workshop
 

More from Kaliya "Identity Woman" Young

Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal InformationKaliya "Identity Woman" Young
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Kaliya "Identity Woman" Young
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018Kaliya "Identity Woman" Young
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Kaliya "Identity Woman" Young
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessKaliya "Identity Woman" Young
 
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.Kaliya "Identity Woman" Young
 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemKaliya "Identity Woman" Young
 

More from Kaliya "Identity Woman" Young (20)

Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
History of Identity in Computers
History of Identity in ComputersHistory of Identity in Computers
History of Identity in Computers
 
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Insight analytics: Identity Nexus - The Future of Consumer  Personal InformationInsight analytics: Identity Nexus - The Future of Consumer  Personal Information
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
 
Aadhaar Identity North Presentation
Aadhaar Identity North PresentationAadhaar Identity North Presentation
Aadhaar Identity North Presentation
 
Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk Domains of Identity and Self-Sovereign Identity India talk
Domains of Identity and Self-Sovereign Identity India talk
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Domains of Identity
Domains of IdentityDomains of Identity
Domains of Identity
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
 
Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF Blockchain v Cryptocurrency: Talk for BridgeSF
Blockchain v Cryptocurrency: Talk for BridgeSF
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
 
Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016Identity 101: Boot Camp for Identity North 2016
Identity 101: Boot Camp for Identity North 2016
 
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
 
Ethical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data EcosystemEthical Market Models in the Personal Data Ecosystem
Ethical Market Models in the Personal Data Ecosystem
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
Personal Clouds + Augmented Reality
Personal Clouds + Augmented RealityPersonal Clouds + Augmented Reality
Personal Clouds + Augmented Reality
 
Identity and Context : People and Personal Data
Identity and Context : People and Personal DataIdentity and Context : People and Personal Data
Identity and Context : People and Personal Data
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 

Online Identity for Community Managers: OpenID, OAuth, Information Cards

  • 1. Online Identity: OpenID, OAuth, Information Cards OCRN Aug 2009 Kaliya Hamlin, Identity Woman @identitywoman identitywoman.net skype:identitywoman AIM/e-mail:kaliya@mac.com co-founder, co-producer and the facilitator of the INTERNET IDENTITY WORKSHOP www.internetidentityworkshop.com Wednesday, August 19, 2009
  • 2. I am a community builder. This is the technical community around user-centric digital identity that I have helped build. We have met since 2005 every 6 months at the Internet Identity Workshop. Wednesday, August 19, 2009
  • 3. In mid 2004 Julia Butterfly Hill launched this website to encourage people to be active and linked to 40+ organizations. These sites had about 50 login opportunities - each one of them each required a new/ different user name and password. How were all these groups going to work together –to form a strong community - if the citizens they were asking to participate were required to create several dozen accounts just to join the related efforts and collaborate across them? The answer is: with difficulty. Just having links to good things is not enough to support a networked movement. Activism as Patriotism only lasted until early 2007. Wednesday, August 19, 2009
  • 4. My sketches from 2003 for distributed social network platform with user-centric identity. How could the people that I knew shared interests and passion in community (both facet to face and online), be able to work together across boundaries and domains on the web? In 2003 I began to sketch out designs for online “social network tools” (that term was not yet in widespread use) for face to face communities to connect online. I knew user-centric identity technologies were essential but others didnʼt see it yet. Wednesday, August 19, 2009
  • 5. To cross boundaries and domains on the web people, citizens, consumers needed the power to manage their own identity information. By identity information I specifically mean the identifiers and handles that they use across time and in cyber space - controlling the ways in which they are “seen” in different contexts. To do this we need open technical standards to make identifiers portable across contexts and we need interfaces to make this easy. Wednesday, August 19, 2009
  • 6. The good news is that the identity community has come a long way in developing identity management tools. Three are discussed in this slideshare. Wednesday, August 19, 2009
  • 7. The first two technologies I will be covering are OpenID and OAuth - the key protocols in the so-called “open stack” Wednesday, August 19, 2009
  • 9. OpenID creates an integrated and wholistic “online life” (identity) replacing the fragmentation that is created by maintaining 100-300 different accounts for different online services and the necessity to create a new one at every website that requires a login. Can you imagine how much easier and more pleasant community life would be if we could reduce the number of identifiers and handles to a manageable number – say under ten. Wednesday, August 19, 2009
  • 10. Different persona’s for one user that could each have a different OpenID URL. Wednesday, August 19, 2009
  • 11. The user goes to a website Wednesday, August 19, 2009
  • 12. Traditionally the user is presented with the opportunity Login with a user-name and password Wednesday, August 19, 2009
  • 13. user name/password is replaced with OpenID login box The user enters a URL they control - like their blog URL or from a provider. * Newer user interfaces allow user to pick Open ID provider they might have like Google,Yahoo, Myspace, Facebook, AOL etc... Wednesday, August 19, 2009
  • 14. The website the user is logging into redirects the user to where their URL Wednesday, August 19, 2009
  • 15. The user is asked to authenticate Wednesday, August 19, 2009
  • 16. The user responds with a password (or other additional methods of authentication like a token) Wednesday, August 19, 2009
  • 17. Authentication is successful! The site with the user’s URL redirects the user back to the the user is website they are logging into. logged in Wednesday, August 19, 2009
  • 18. Who’s In? Corporate Members: • Facebook - Luke Shepard • Google - Eric Sachs • IBM - Nataraj (Raj) Nagaratnam • Microsoft - Michael B. Jones Community Members: • PayPal - Andrew Nash • Brian Kissel (JanRain) • VeriSign - Gary Krall • Chris Messina (independent) • Yahoo! - Raj Mata • David Recordon (Six Apart) • Joseph Smarr (Plaxo) • Nat Sakimura (Nomura Research Institute) • Scott Kveton • Snorri Giorgetti (OpenID Europe) • Allen Tom (Yahoo) Wednesday, August 19, 2009
  • 19. What you can do: * Accept OpenID’s * Issue OpenID’s (to employees) * Issue OpenID’s to your user base Wednesday, August 19, 2009
  • 20. Single Sign On isnʼt enough though. You also have to empower people to be able to share data their own data. oauth.net Wednesday, August 19, 2009
  • 21. The user belongs to two different sites. Wednesday, August 19, 2009
  • 22. How can the user move photos from photo site to the social network site without giving away the password for the photo site to the social network site? Wednesday, August 19, 2009
  • 23. The user asked if they want to share - then redirected to the site to give their permission Wednesday, August 19, 2009
  • 24. The photo site gives the social network site a token to the social network that gives it access to their account. Wednesday, August 19, 2009
  • 25. A data tunnel is created between the user’s accounts on both sites Wednesday, August 19, 2009
  • 26. A user posts photos and they can flow from one to the other - and they didn’t give away their password. Wednesday, August 19, 2009
  • 28. What you can do: END THE PASSWORD ANTI-PATTERN STOP Asking users for their password to gain access to another site on their behalf Implement Oauth on your site Ask your partners to implement it. Wednesday, August 19, 2009
  • 35. Who’s In? Card Space Wednesday, August 19, 2009
  • 37. What you can do: *Issue information cards to members of your site/organization *Accept information cards from netizens to collect information you think is important *Use it to get third party validation about key things important to you - so you donʼt have to do identity proofing. Wednesday, August 19, 2009
  • 38. Kaliya Hamlin Identity Woman @identitywoman identitywoman.net skype:identitywoman AIM/e-mail:kaliya@mac.com co-founder, co-producer and the facilitator of the INTERNET IDENTITY WORKSHOP .com Wednesday, August 19, 2009